咨询与建议

限定检索结果

文献类型

  • 31,754 篇 会议
  • 27,192 篇 期刊文献
  • 247 册 图书

馆藏范围

  • 59,192 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 36,671 篇 工学
    • 20,212 篇 计算机科学与技术...
    • 16,231 篇 软件工程
    • 7,564 篇 信息与通信工程
    • 6,286 篇 电子科学与技术(可...
    • 6,259 篇 电气工程
    • 4,828 篇 控制科学与工程
    • 3,990 篇 光学工程
    • 3,450 篇 生物工程
    • 2,755 篇 机械工程
    • 2,701 篇 化学工程与技术
    • 2,554 篇 材料科学与工程(可...
    • 2,530 篇 生物医学工程(可授...
    • 2,213 篇 仪器科学与技术
    • 1,748 篇 动力工程及工程热...
    • 1,121 篇 力学(可授工学、理...
    • 953 篇 交通运输工程
    • 946 篇 土木工程
    • 866 篇 建筑学
  • 23,372 篇 理学
    • 10,227 篇 物理学
    • 9,770 篇 数学
    • 4,076 篇 生物学
    • 3,154 篇 统计学(可授理学、...
    • 2,991 篇 化学
    • 2,005 篇 系统科学
  • 7,595 篇 管理学
    • 4,721 篇 管理科学与工程(可...
    • 3,128 篇 图书情报与档案管...
    • 1,822 篇 工商管理
  • 2,127 篇 医学
    • 1,737 篇 临床医学
    • 1,426 篇 基础医学(可授医学...
    • 945 篇 药学(可授医学、理...
  • 1,003 篇 法学
  • 658 篇 经济学
  • 566 篇 农学
  • 350 篇 教育学
  • 186 篇 文学
  • 158 篇 军事学
  • 119 篇 艺术学
  • 12 篇 哲学
  • 9 篇 历史学

主题

  • 1,820 篇 laboratories
  • 1,712 篇 computer science
  • 1,016 篇 computational mo...
  • 907 篇 feature extracti...
  • 717 篇 semantics
  • 695 篇 training
  • 685 篇 deep learning
  • 542 篇 machine learning
  • 481 篇 computer archite...
  • 473 篇 bandwidth
  • 461 篇 accuracy
  • 437 篇 data mining
  • 418 篇 application soft...
  • 418 篇 optimization
  • 400 篇 neural networks
  • 394 篇 costs
  • 390 篇 testing
  • 389 篇 predictive model...
  • 350 篇 robustness
  • 344 篇 image segmentati...

机构

  • 1,105 篇 cavendish labora...
  • 1,026 篇 department of ph...
  • 982 篇 physikalisches i...
  • 969 篇 oliver lodge lab...
  • 882 篇 university of ch...
  • 642 篇 infn laboratori ...
  • 626 篇 infn sezione di ...
  • 608 篇 infn sezione di ...
  • 593 篇 fakultät physik ...
  • 586 篇 infn sezione di ...
  • 554 篇 school of physic...
  • 543 篇 horia hulubei na...
  • 531 篇 school of physic...
  • 528 篇 department of ph...
  • 521 篇 iccub universita...
  • 519 篇 imperial college...
  • 517 篇 h.h. wills physi...
  • 515 篇 nikhef national ...
  • 509 篇 stfc rutherford ...
  • 505 篇 physik-institut ...

作者

  • 267 篇 barter w.
  • 259 篇 a. gomes
  • 249 篇 beiter a.
  • 247 篇 c. alexa
  • 244 篇 j. m. izen
  • 238 篇 c. amelung
  • 237 篇 bellee v.
  • 236 篇 g. bella
  • 236 篇 j. strandberg
  • 236 篇 d. calvet
  • 231 篇 s. chen
  • 229 篇 blake t.
  • 228 篇 g. spigo
  • 227 篇 brundu d.
  • 225 篇 bowcock t.j.v.
  • 221 篇 betancourt c.
  • 221 篇 j. wang
  • 220 篇 f. siegert
  • 220 篇 amato s.
  • 219 篇 borsato m.

语言

  • 55,915 篇 英文
  • 2,181 篇 其他
  • 1,090 篇 中文
  • 8 篇 日文
  • 6 篇 德文
  • 6 篇 法文
  • 2 篇 斯洛文尼亚文
  • 1 篇 朝鲜文
  • 1 篇 俄文
检索条件"机构=Computer Science and Engineering Laboratory"
59193 条 记 录,以下是41-50 订阅
排序:
Multifrequency measurement system with no frequency ambiguity based on two frequency-space mappings
收藏 引用
Optical engineering 2025年 第3期64卷
作者: Zhang, Jiahong Ma, Di Li, Peiqi Kunming University of Science and Technology Faculty of Information Engineering and Automation Kunming China Kunming University of Science and Technology Yunnan Key Laboratory of Computer Technology Applications Kunming China
Multifrequency measurement system with no frequency ambiguity based on two frequency-space mappings has been designed and investigated. By simultaneously mapping the unknown frequencies with a certain frequency shift ... 详细信息
来源: 评论
Security Strategy of Digital Medical Contents Based on Blockchain in Generative AI Model
收藏 引用
computers, Materials & Continua 2025年 第1期82卷 259-278页
作者: Hoon Ko Marek R.Ogiela Division of Computer Science and Engineering Sunmoon UniversityAsan31460Republic of Korea AGH University of Krakow Cryptography and Cognitive Informatics LaboratoryKrakow30-059Poland
This study presents an innovative approach to enhancing the security of visual medical data in the generative AI environment through the integration of blockchain *** combining the strengths of blockchain and generati... 详细信息
来源: 评论
T³Planner: Multi-Phase Planning Across Structure-Constrained Optical, IP, and Routing Topologies
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年 第5期43卷 1823-1839页
作者: Hao, Yijun Yang, Shusen Li, Fang Zhang, Yifan Zhao, Cong Ren, Xuebin Zhao, Peng Xu, Chenren Wang, Shibo Xi’an Jiaotong University National Engineering Laboratory for Big Data Analytics Xi’an710049 China Xi’an Jiaotong University National Engineering Laboratory for Big Data Analytics Ministry of Education Key Laboratory for Intelligent Networks and Network Security Xi’an710049 China Peking University School of Computer Science Beijing100871 China The Chinese University of Hong Kong Department of Computer Science and Engineering Hong Kong National Engineering Laboratory for Big Data Analytics Xi'an Jiaotong University Xi'an710049 China
Network topology planning is an essential multi-phase process to build and jointly optimize the multi-layer network topologies in wide-area networks (WANs). Most existing practices target single-phase/layer planning, ... 详细信息
来源: 评论
Perturb, Attend, Detect, and Localize (PADL): Robust Proactive Image Defense
收藏 引用
IEEE Access 2025年 13卷 81755-81768页
作者: Bartolucci, Filippo Masi, Iacopo Lisanti, Giuseppe University of Bologna CVLab Computer Science and Engineering Department Bologna40126 Italy University of Rome Sapienza OmnAI Laboratory Computer Science Department Rome00185 Italy
Image manipulation detection has gained significant attention due to the rise of Generative Models (GMs). Passive detection methods often overfit to specific GMs, limiting their effectiveness. Recently, proactive appr... 详细信息
来源: 评论
Multi-Level and Energy-Efficient Partial Computation Offloading in Heterogeneous Edge Intelligence
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 14993-15007页
作者: Xu, Baoyu Ruan, Yancheng Qiu, Chenghu He, Shuibing Shu, Feng Kang, Xiaoyang Zhang, Lihua Academy for Engineering and Technology Shanghai200433 China Shanghai University School of Computer Engineering and Science Shanghai200444 China Zhejiang University College of Computer Science and Technology Hangzhou310027 China University of Sydney School of Electrical and Information Engineering Australia Fudan University Laboratory for Neural Interface and Brain Computer Interface MOE Frontiers Center for Brain Science Academy for Engineering and Technology Shanghai200433 China Fudan University Academy for Engineering and Technology Shanghai200433 China
Due to the diversity of edge devices and applications, edge systems are heterogeneous and have been applied in artificial intelligence fields such as smart factories and intelligent transportation, which is called het... 详细信息
来源: 评论
A survey on textual emotion cause extraction in social networks
收藏 引用
Digital Communications and Networks 2025年 第2期11卷 524-536页
作者: Sancheng Peng Lihong Cao Guojun Wang Zhouhao Ouyang Yongmei Zhou Shui Yu Laboratory of Language Engineering and Computing Center for Linguistics and Applied Linguistics Guangdong University of Foreign Studies School of English Education Guangdong University of Foreign Studies School of Computer Science and Cyber Engineering Guangzhou University South China University of Technology School of Information Science and Technology Guangdong University of Foreign Studies School of Computer Science University of Technology Sydney
With the rapid development of web technology, Social Networks(SNs) have become one of the most popular platforms for users to exchange views and to express their emotions. More and more people are used to commenting o... 详细信息
来源: 评论
A Survey of the Application of Neural Networks to Event Extraction
收藏 引用
Tsinghua science and Technology 2025年 第2期30卷 748-768页
作者: Jianye Xie Yulan Zhang Huaizhen Kou Xiaoran Zhao Zhikang Feng Lekang Song Weiyi Zhong College of Computer Science and Technology China University of Petroleum(East China)Qingdao 266000China Shandong Provincial University Laboratory for Protected Horticulture Weifang University of Science and TechnologyWeifang 261000China School of Computer Science and Engineering Nanjing University of Science and TechnologyNanjing 210000China School of Computer Science Qufu Normal UniversityRizhao 276800China
Event extraction is an important part of natural language information extraction,and it’s widely employed in other natural language processing tasks including question answering and machine reading ***,there is a lac... 详细信息
来源: 评论
Seeking a Sense of Meaning and Companionship in Life: Informal Learning on Douyin Among Chinese Older Adults
收藏 引用
Proceedings of the ACM on Human-computer Interaction 2025年 第2期9卷 1-24页
作者: Qian, Zhigu Fu, Jiaojiao Zhou, Yangfan School of Computer Science Fudan University Shanghai Key Laboratory of Intelligent Information Processing China School of Information Science and Engineering East China University of Science and Technology China
This study examines how Chinese older adults leverage Douyin, a short video platform, for informal learning purposes, analyzing their usage patterns, motivations, and encountered challenges. Although Douyin was not ex... 详细信息
来源: 评论
Gupacker: Generalized Unpacking Framework for Android Malware
收藏 引用
IEEE Transactions on Information Forensics and Security 2025年 20卷 4338-4352页
作者: Zheng, Tao Hou, Qiyu Chen, Xingshu Ren, Hao Li, Meng Li, Hongwei Shen, Changxiang Sichuan University School of Cyber Science and Engineering Chengdu610065 China Sichuan University School of Cyber Science and Engineering Cyber Science Research Institute Key Laboratory of Data Protection and Intelligent Management Ministry of Education Chengdu610065 China Hefei University of Technology Key Laboratory of Knowledge Engineering with Big Data Ministry of Education Intelligent Interconnected Systems Laboratory of Anhui Province School of Computer Science and Information Engineering Hefei230002 China University of Padua Department of Mathematics HIT Center Padua35131 Italy University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China Sichuan University Cyber Science Research Institute Key Laboratory of Data Protection and Intelligent Management Ministry of Education Chengdu610065 China
Android malware authors often use packers to evade analysis. Although many unpacking tools have been proposed, they face two significant challenges: 1) They are easily impeded by anti-analysis techniques employed by p... 详细信息
来源: 评论
Federated Deep Reinforcement Learning for Multimodal Content Caching in Edge-Cloud Networks
收藏 引用
IEEE Transactions on Network science and engineering 2025年 第3期12卷 2188-2201页
作者: Feng, Weijia Zuo, Xinyu Zhang, Ruojia Zhu, Yichen Wang, Chenyang Guo, Jia Sun, Chuan Tianjin Normal University School of Computer and Information Engineering Tianjin300387 China Shenzhen University College of Computer Science and Software Engineering Shenzhen518132 China Shenzhen University Guangdong Laboratory of Artificial Intelligence and Digital Economy Shenzhen518132 China Chongqing Normal University School of Computer and Information Science Chongqing401333 China
Edge caching presents a promising avenue for mitigating backbone network congestion by strategically caching frequently accessed content at the network periphery. As most current edge caching solutions are designed fo... 详细信息
来源: 评论